IT Security and Penetration Testing: Scanning Tools

0.0(0)
studied byStudied by 0 people
0.0(0)
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/14

flashcard set

Earn XP

Description and Tags

A set of flashcards covering key concepts from IT security and penetration testing focused on scanning tools.

Last updated 4:29 PM on 2/5/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

15 Terms

1
New cards

What is the main function of scanners in IT security?

Scanners find and fix vulnerabilities in remote machines on a network.

2
New cards

What is a port scanner?

A software tool that examines and reports the condition (open or closed) of a port and the application listening on that port.

3
New cards

When did scanners first appear?

Scanners first appeared even before ARPANET to monitor connections between mainframes and dumb terminals.

4
New cards

What is a war dialer?

A script that tells the modem to dial a range of phone numbers defined by the user to identify those numbers that connect to remote computers.

5
New cards

What does TCP Connect Scanning do?

Attempts to make TCP connections with all of the ports on a remote system.

6
New cards

What is Half-Open Scanning?

A method of TCP scanning that sends only the SYN message, without completing the connections.

7
New cards

How does UDP scanning work?

It examines the status of UDP ports on a target system by sending a 0-byte UDP packet, expecting an ICMP unreachable message if the port is closed.

8
New cards

What is Ping scanning?

A method that demonstrates whether a remote host is active by sending ICMP echo request packets to that host.

9
New cards

What are some popular scanners mentioned?

Nessus, Nmap, SARA, SAINT, Strobe, Cheops.

10
New cards

What is Nmap used for?

Nmap is a powerful, flexible, and easy-to-use network scanning tool.

11
New cards

What is SARA in network security?

Security Auditor's Research Assistant, a third-generation network security analysis tool.

12
New cards

What is the main purpose of SAINT?

It is an integrated network security tool suitable for UNIX, Linux, and Mac OS X.

13
New cards

Who developed Strobe?

Strobe was developed by Julian Assange.

14
New cards

What is a notable feature of Cheops?

It is a port scanner for Linux that uses significant CPU resources, slowing down other applications.

15
New cards

What is the importance of scanners in network security?

Scanners automate the process of examining network weaknesses, identifying known vulnerabilities and open ports.

Explore top flashcards